one phd student has approached you for getting references on the topic

Answers

Answer 1

Sure! Here's an answer for you.

When a PhD student approaches me for references on a particular topic, there are a few things I take into consideration before providing them with sources.

Firstly, I ask them to provide me with a brief summary of their research topic and what specific areas they are interested in. This helps me narrow down the most relevant sources to provide them with.

Next, I make sure to recommend sources that are credible and reliable. This means looking for peer-reviewed articles, books, and research papers from reputable sources such as academic journals, conferences, and university databases. It is also important to consider the publication date and whether the sources are up to date and relevant to the current research on the topic.

To know more about approaches visit:

https://brainly.com/question/30967234

#SPJ11


Related Questions

Which of these is the most common combination or a combo chart? A) pie and line. B) column and pie. C) column and line. D) column and bar.

Answers

The most common combination for a combo chart is a column and line chart.

The correct answer to the given question is option C.

A combo chart is a type of chart that combines two or more chart types to show different sets of data together. Combo charts are commonly used in data visualization when one set of data has significantly different scales or categories from the other set. A common example of a combo chart is a column and line chart, where the column chart shows one set of data using vertical bars while the line chart displays another set of data using a line.

Out of the options provided, the most common combination for a combo chart is a column and line chart (option C). This is because column charts are great for displaying categories, while line charts are ideal for tracking trends over time.

Pie charts, on the other hand, are not commonly used in combo charts because they are best suited for displaying proportions of a whole, rather than comparing data. However, it is possible to combine a pie chart with another chart type, such as a line chart, to show trends in proportion over time.

Similarly, bar charts are also not commonly used in combo charts because they are essentially the same as column charts but in a horizontal orientation. Thus, column charts are preferred due to their vertical orientation and ease of use.

In conclusion, the most common combination for a combo chart is a column and line chart, making option C the correct answer.

For more such questions on combo chart, click on:

https://brainly.com/question/32145072

#SPJ8

ways in which a computer are used in online resavation

Answers

Answer:

Explanation:

Modern GDSs typically also allow users to book hotel rooms, rental cars, airline tickets as well as other activities and tours. ... These are also used to relay computerized information for users in the hotel industry, making reservation and ensuring that the hotel is not overbooked.

true or false,A technology called narrowband has rapidly been replacing modems and analog phone lines for data communications to and from our homes, schools, and offices.

Answers

The given statement "A technology called narrowband has rapidly been replacing modems and analog phone lines for data communications to and from our homes, schools, and offices" is true.

Narrowband technology has been widely used in recent years for data communications. It provides a more efficient way of transmitting data compared to traditional analog phone lines and modems.

Narrowband technology allows for faster transmission speeds and greater bandwidth, which is particularly important in today's data-driven world. This technology is being used in various industries, including telecommunications, healthcare, education, and government. It has also been replacing analog phone lines and modems in many homes, schools, and offices, making data communication faster and more reliable.

To know more about Narrowband technology visit:

https://brainly.com/question/28255797

#SPJ11

Think about one form of technology you can’t imagine living without. Is it your smart television? Minecraft? Your smartphone or iPad? Tablet? Type a paragraph explaining why you’re so crazy about this technology, and tell what you would do in its place if it were taken away for a week. Also please estimate the number of hours per day you use the particular technology item that you do not want to be without.

Answers

Answer:

A computer

Explanation:

I need this for for school purposes and slightly for entertainment. Regarding what would happen if it was taken away for a week, I would most likely fail a class or two based on the standards they measure by. Quite frankly, it's not that I'm crazy about having it, it's the fact that I need it for the time being if I wish to further accel in the world and get to where I want to be. I use it for about 5 or 6 hours a day. This is the technology I don't want to do without.

Have a great day.

We are living in an era of advanced technology, where every part of our daily lives is related to the science of craft in one way or another. There's no doubt that over the years technology has been responsible for creating amazingly useful resources which put all the information we need at our fingertips. The development of technology has led to so many mind-blowing discoveries, better facilities, and better luxuries, but at the same has dramatically changed our daily lives. Various highly-developed gadgets, connected to the Internet, have changed the way we communicate, use humor, study, work, shop, play, and behave.

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

True or False: Using “OR” between search terms helps narrow down

Answers

the answer is true. nemenekekkelelsps
Yeah the answer is true

most data files are smaller than the number of blocks allocated to their storage by the file system, the unused spaces is known as what?

Answers

The unused spaces in a file system that are larger than the actual size of data files are typically referred to as internal fragmentation.

Internal fragmentation occurs when a file system allocates storage in fixed-sized blocks or clusters, and the size of the file is smaller than the allocated block size.

As a result, there is wasted space within the allocated block that is not utilized by the file.

Internal fragmentation can occur in various file systems, including both traditional file systems like FAT and NTFS as well as modern file systems like ext4 or APFS.

It is a common occurrence because files come in different sizes, and the allocated block size is typically fixed to ensure efficient storage allocation and access.

The presence of internal fragmentation can lead to inefficient disk space utilization.

As more files are stored and deleted, the unused spaces accumulate, resulting in wasted storage capacity.

This fragmentation can impact overall system performance as well, as it requires additional disk operations to access fragmented files and can contribute to increased disk fragmentation over time.

To mitigate internal fragmentation, file systems often employ techniques such as block suballocation, file clustering, or dynamic block sizing.

These approaches aim to optimize disk space usage and reduce the impact of internal fragmentation by allocating storage more efficiently based on the size of the files being stored.

For more questions on internal fragmentation.

https://brainly.com/question/14932038

#SPJ8

A user calls in about a printer issue. You ask for the IPv4 address listed on the printer's configuration report. The user reads an IPv4 address of 169.254.13.50 from the report. What would this tell you

Answers

The  IPv4 address of 169.254.13.50  tells that the printer failed to obtain an IP address from DHCP.

What IP Addresses in Network Printers?

The IP address is known to be one that is special to the printer as it is one that works as a form of an identifier and it is one that informs a computer where to see the printer on the network.

So, one can say that the  IPv4 address of 169.254.13.50  tells that the printer failed to obtain an IP address from DHCP.

See full question below

A user calls in about a printer issues. You ask for the IPv4 address listed on the printer's

configuration report. The user reads an IPv4 address of 169.254.13.50 from the report. What would

this tell you?

a. The printer has a paper jam

b. The printer failed to obtain an IP address from DHCP

c. The printer had too many print jobs sent to it

d. The printer had a valid IP address and should work after a restart

Learn more about printer from

https://brainly.com/question/145385

#SPJ1

An archaeologist is dating several recently uncovered sites. She estimates that the site featuring a post-and-lintel design is older than the site featuring corbelled arches. Why might she have reached this conclusion?

The corbelled arch did not become common until the first century C.E.
The post-and-lintel design was discontinued at the end of the Neolithic Era.
The corbelled arch required more advanced knowledge to create than the post-and-lintel design.
The post-and-lintel design did not require slave labor, unlike the corbelled arch.

Answers

Answer:

Its b

Explanation:

just took the test

In Chapter 20 you read all about different types of private networks -- VLANs, NAT, PAT, and network segmentation. Additionally, the chapter covered virtual networks. Network virtualization has changed computing for the better. It saves money, allows for more scalability in networks, provides a more rich training environment since students or new hires are able to go out and "play" with the virtual machines and really get some hands-on experience! Some of you may not have really heard too much about virtual networks or how to use a virtual computer. For this discussion board, I want you to share with the class what experience (if any) you have with VMs. Initial Response Guidelines:

In roughly 100-150 words, describe to the class your experience with virtual networks or virtual computers. Virtual reality does not really count, but if it's all you have to discuss it will work. I want you to describe not only your experiences but also your thoughts on using virtual machines to save money, learn new techniques and any other aspects of VMs you want to share.

Answers

I have extensive experience with virtual networks and virtual machines (VMs). I have worked with various virtualization platforms like VMware, VirtualBox, and Hyper-V, both for personal use and in professional settings.

Virtual networks have been an integral part of my work and learning environment. They offer several advantages, including cost savings and increased scalability. By running multiple virtual machines on a single physical server, resources can be utilized more efficiently, reducing hardware costs. Moreover, VMs can be easily cloned, allowing for quick deployment and replication of complex network setups.

Using virtual machines has also enhanced my learning experience. I have been able to experiment with different operating systems, software configurations, and networking scenarios without the need for additional physical hardware. This hands-on approach has enabled me to gain practical skills, troubleshoot issues, and explore new techniques in a safe and isolated environment.

Overall, virtual machines have been invaluable tools for me. They have provided cost-effective solutions, facilitated learning opportunities, and allowed for the exploration of diverse network setups. The ability to create and manage virtual networks has not only saved money but also enriched my understanding of networking concepts and technologies.

To know more about virtual machines ,visit:
https://brainly.com/question/31674424
#SPJ11

in 2015, the nation of burundi had an average bandwidth per internet connection of 11.24 kb/s. in 2016, their average bandwidth was 6.91 kb/s.which statement is true based on those statistics?

Answers

Using the provided statistics, the statement that is true is that the average bandwidth per internet connection in Burundi decreased from 11.24 kb/s in 2015 to 6.91 kb/s in 2016. This means that the average speed at which data is transmitted over the internet in Burundi decreased over the course of a year.

The decrease in average bandwidth per internet connection could be attributed to a number of factors, including a decrease in internet infrastructure investment or the increase in the number of internet users without a corresponding increase in infrastructure. This decrease in bandwidth could have significant impacts on internet users in Burundi, including slower internet speeds, longer download times, and difficulty streaming videos or other multimedia.

For such more question on bandwidth

https://brainly.com/question/12908568

#SPJ11

Suppose 10 connections traverse the same link of rate 1 gbps. suppose that the client access links all have rate 5 mbps. what is the maximum throughput for each connection?

Answers

In conclusion, the maximum throughput for each connection is 5 Mbps (or 5000 Kbps) when 10 connections traverse the same link with a rate of 1 Gbps.

The maximum throughput for each connection can be calculated by considering the bottleneck link.

In this case, the client access links with a rate of 5 Mbps are the bottleneck.

To find the maximum throughput, we need to compare the bottleneck link rate with the rate of the connections traversing the link.

The bottleneck link rate is 5 Mbps (or 5000 Kbps), while each connection has a rate of 1 Gbps (or 1000 Mbps).

Since the bottleneck link rate is lower than the connection rate, the maximum throughput for each connection will be limited by the bottleneck link rate.

Therefore, the maximum throughput for each connection will be 5 Mbps (or 5000 Kbps).

To know more about bottleneck link, visit:

https://brainly.com/question/31000500

#SPJ11

Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.

Answers

Answer:

Set a time limit for herself. Ask her parents for help monitering her app usage.

does anyone know edhesive 4.3 question 1

Answers

No

.................................. :)

Answer:

Ive been trynna find out for like the last hour

Explanation: I'm dumb as hell

What is the type of the variable x after the following: x=1/1 ?

Answers

The type of the variable x after x=1/1 is float. This is because division operations in Python always produce a float type, even if the two values used in the division are integers.


The type of the variable x after the following: x=1/1 is an integer.

In Python, variables are not explicitly declared with a specific data type. Instead, the data type is automatically determined based on the value that is assigned to the variable. In this case, the value 1/1 is equivalent to 1, which is an integer. Therefore, the variable x will have the data type of an integer.

Here is the code snippet:

x = 1/1
print(type(x))

Learn more about Python: https://brainly.com/question/26497128

#SPJ11

Your company has an Azure subscription. You plan to create a virtual machine scale set named VMSS1 that has the following settings: Resource group name: RG1 Region: West US Orchestration mode: Uniform Security type: Standard OS disk type: SSD standard Key management: Platform-managed key You need to add custom virtual machines to VMSS1. What setting should you modify?

Answers

Answer:

To add custom virtual machines to a virtual machine scale set (VMSS) in Azure , you need to modify the "Capacity" setting of the VMSS.

More specifically, you can increase the capacity of the VMSS by scaling out the number of instances in the scale set. This can be done using Azure PowerShell, Azure CLI or the Azure portal.

For example, here's some Azure PowerShell code that sets the capacity of VMSS1 to 5:

Set-AzVmss `

 -ResourceGroupName "RG1" `

 -VMScaleSetName "VMSS1" `

 -Capacity 5

This will increase the number of virtual machines in the VMSS to 5. You can modify the capacity to be any desired value based on your needs.

Explanation:


When conducting an audit at a memorial coffee shop,
what data collection will you use? Explain why you chose the data
collection!

Answers

Here are a few examples of data collection methods commonly used in audits:

1. Financial Records Review: This involves examining the coffee shop's financial statements, such as income statements, balance sheets, and cash flow statements.

It helps to assess the financial performance, profitability, and liquidity of the business. Financial records provide important insights into revenue, expenses, assets, liabilities, and overall financial health.

2. Sales and Transaction Data Analysis: Analyzing sales and transaction data can help evaluate the coffee shop's revenue streams, identify patterns in customer behavior, and detect any irregularities or discrepancies.

Point of Sale (POS) systems or other sales tracking tools can provide valuable data on sales volume, product mix, pricing, discounts, and customer preferences.

3. Inventory and Stock Control Examination: This involves reviewing the coffee shop's inventory management processes, stock records, and procurement practices.

It helps ensure proper inventory control, accuracy of stock levels, and prevention of stock shortages or excesses. Analyzing inventory turnover rates and comparing them with industry benchmarks can reveal potential inefficiencies or areas for improvement.

4. Employee Time and Wage Data Collection: Gathering information on employee schedules, working hours, and wage rates is crucial for assessing compliance with labor laws and regulations.

It helps ensure that employees are receiving proper wages, breaks, and overtime compensation as mandated by labor standards. Time and attendance systems or employee payroll records can be utilized for this purpose.

5. Customer Feedback and Reviews: Collecting feedback from customers through surveys, reviews, or comment cards provides valuable insights into the coffee shop's service quality, customer satisfaction levels, and areas for improvement. This data helps evaluate the coffee shop's reputation, customer loyalty, and overall market perception.

Learn more about Adult Data Collection here:

https://brainly.com/question/33389814

#SPJ11

execute or non-execute some of Javascript statements according to condition expression result.................​

Answers

Answer:

execute

Explanation:

Internal control components are built on the foundation of the ------- tone established by top management in its control environment.

Answers

Internal control components are built on the foundation of the ethical tone established by top management in its control environment.

Computer ethics is the study of the rules, principles, and practices that guide the use of computing technology and the disciplines that are related to it without impairing or infringing upon the moral principles and convictions of any one person, group, or entity.

Computer ethics is a notion in ethics that discusses the ethical problems and restrictions that result from using computers, as well as ways to prevent or minimize them.

Here you can learn more about ethical in the link brainly.com/question/11992384

#SPJ4

what does the windows update feature allow you to do?
a. scan email attachments
b. install important patches
c. scan for viruses
d. block pop-ups

Answers

The answer is D
Explanation: none

Answer:

B

Explanation:

The purpose of Windows Update, is to bring feature updates and hotfixes to your Windows PC, it also allows for updating services such as the Windows Defender virus definitions. However, Windows Update does not block popups, but instead installs important updates for your PC.

java uses implicit heap storage recovery, whereas c uses explicit heap storage recovery. what is an advantage of implicit heap storage recovery?

Answers

Java and C are two programming languages that differ in their approach to memory management. Java uses implicit heap storage recovery, whereas C uses explicit heap storage recovery.

Implicit heap storage recovery is an automatic memory management technique in which the language runtime system automatically deallocates unused objects and releases the associated memory. On the other hand, explicit heap storage recovery is a manual memory management technique in which the programmer explicitly deallocates the memory that is no longer needed. One of the main advantages of implicit heap storage recovery is that it reduces the likelihood of memory leaks and segmentation faults. Memory leaks occur when memory is allocated but not released, leading to a gradual depletion of available memory. In contrast, segmentation faults occur when a program attempts to access memory that it is not allowed to access. Both of these issues can be challenging to debug and can lead to unpredictable behavior in a program. However, with implicit heap storage recovery, these issues are less likely to occur because the language runtime system is responsible for deallocating unused memory.

Another advantage of implicit heap storage recovery is that it simplifies the programming process. Programmers do not have to worry about deallocating memory explicitly, which can be time-consuming and error-prone. Instead, they can focus on writing code that performs the desired functionality of the program. This can lead to more efficient and effective coding, as programmers can devote more time to writing and testing code rather than managing memory. In summary, implicit heap storage recovery is a useful technique for managing memory in programming languages like Java. It reduces the likelihood of memory leaks and segmentation faults, simplifies the programming process, and allows programmers to focus on writing code that performs the desired functionality of the program.

Learn more about Java here: https://brainly.com/question/12972062

#SPJ11

Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.

Answers

Answer:

When is this due?

Explanation:

I will write it

Most of us have been using elements of Web 2.0 without even realizing it.
True
False

Answers

Answer: True?

Explanation:

I’m pretty sure I’m new to that stuff

a(n) is the actual request to a ca containing a public key and the requisite information needed to generate a certificate.

Answers

A CSR is a request to a certificate authority (CA) to issue a public key certificate. It contains information about the applicant and the public key that the CA will use to issue the certificate.

A Certificate Signing Request (CSR) is an encoded file that is used to request a public key certificate from a certificate authority. The CSR contains information about the applicant, such as the organization name, domain name, location, and public key. This information is used by the certificate authority to determine whether to issue the certificate. Once the CSR is created and submitted, the certificate authority will review the information and, if approved, will issue the certificate. The CSR is a critical part of the process that enables encryption and other security measures to be used in applications, websites, and other services. Without the CSR, a certificate authority cannot issue a certificate and the encryption and security measures cannot be implemented.

Learn more about Information here:

brainly.com/question/12947584

#SPJ4

what is a cell address in xsl sheet

Answers

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

testing whether a computer boots up the first time is an example of ____

Answers

"Initial system testing" or "Power-on self-test (POST)" would be an appropriate term for testing whether a computer boots up the first time.

Testing whether a computer boots up the first time is an example of the Power-On Self-Test (POST) process that runs automatically when a computer is powered on. The POST is a built-in diagnostic program that checks the system's hardware components such as the motherboard, processor, memory, storage, and input/output devices to ensure they are functioning correctly. If any issue is found during the POST, the computer will alert the user through a series of beeps, error messages or a black screen. The POST is an essential process to ensure the system is functional before the operating system starts up.

Learn more about Initial system testing here.

https://brainly.com/question/28201596

#SPJ11

A firm has prepared the following binary integer program to evaluate a number of potential locations for new warehouses. The firm's goal is to maximize the net present value of their decision while not spending more than their currently available capital. 
Max 35x₁+25x₂+15x₃+15x₄
s.t. 4x₁+12x₂+6x₃+7x₄ ≤16 [Constraint 1) 
x₁+x₂+x₃+x₄ ≥2 [Constraint 2] 
x₁+x₂≤1 (Constraint 3 ) 
x₁+x​₃≥1 (Constraint 4 ) 
x₂=x₄ (Constraint 5 ) 

xj​={1, if location j is selected 0, otherwise ​ 
Solve this problem to optimality and answer the following questions.
Answer what will happen to each four locations:
a. Location 1
b. Location 2
c. Location 3
d. Location 4

Answers

The binary integer program provided aims to maximize the net present value of warehouse locations while considering capital constraints and various other constraints.

By solving the problem, we can determine the optimal solution and understand the impact on each location (1, 2, 3, and 4).

To provide a more detailed analysis, it is necessary to solve the program and evaluate the results. Unfortunately, the specific values and coefficients for the objective function and constraints are not provided in the query. Without this information, it is not possible to provide a specific answer regarding the impact on each location.

To determine the outcome for each location, the binary variables x₁, x₂, x₃, and x₄ need to be assigned values of 0 or 1 based on the optimal solution obtained from solving the binary integer program. The values of these variables will indicate whether each location is selected (assigned a value of 1) or not (assigned a value of 0), indicating their status and impact in the solution.

To obtain the optimal solution and assess the impact on each location, the provided binary integer program needs to be solved using appropriate optimization techniques and software. Once the solution is obtained, the values of the variables x₁, x₂, x₃, and x₄ can be analyzed to understand the outcomes for each location.

Learn more about binary integer programming here:

https://brainly.com/question/14697018

#SPJ11

You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to avoid having stale data. Because it is redundant. Because it should be defined in another class. In order to keep it current.

Answers

Answer:

The answer is "In order to avoid having stale data".

Explanation:

In this question, only the above-given choice is correct because follows the class-object concept, and the wrong choices can be defined as follows:

In this question, the second and third choices are wrong because its class field data value is not redundant, it should not define in another class.The third choice is also wrong because it can't define the class field to keep it current.  

Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours to activities related to the job. Which quality is he looking for? A. responsibility B. flexibility C. trust D. reliability E. integrity

Answers

Answer:

reliabitlity

Explanation:

In what situations might you need to use a function that calls another function?

Answers

Answer:

Explanation:

It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.

Other Questions
solve the system of two linear inequalities graphically.y5x10y>x+2 Vector A points in the negative z direction. Vector points at an angle of 31.0" above the positive z axis. Vector C has a magnitude of 16 m and points in a direction 42.0* below the positive x axis. Part B Express your answer using two significant figures. |B|= ________ m Marcus is drawing a model of a bicycle chain and its gears as shown. Where can Marcus draw the points for the chain to create tangent lines that intersect both circles? Select all that apply. Milos constant questions indicate that his attitude has shifted from ? to ? . Which of these vocabulary words would be an appropriate description of a clown?drollbohemianimperceptiblerancorous In the figure, AG, BG, and CG are angle bisectors. Which could represent the reaction mixture after the complete combustion of acetaldehyde, ch3cho? when caring for a patient with a known latex allergy, the nurse would monitor the patient closely for a cross-sensitivity to which foods (select all that apply)? a. grapes b. oranges c. bananas d. potatoes Jesus was led by the devil into the wilderness of Judea.TrueFalse Why are females who participate in certain sports more vulnerable to the condition known as the female athlete triad? Caleb goes out to lunch. The bill, before tax and tip, was $15. A sales tax of 9% was added on. Caleb tipped 14% on the amount after the sales tax was added. What was the total cost of the meal, plus tax and tip? Round to the nearest cent. 1.) What are the physicalproperties of matter? Where should the commas go in this sentence featuring a place?Question 3 options:The 2021 Olympic Games were held in, Tokyo, Japan.The 2021, Olympic Games were held in Tokyo, Japan.The 2021 Olympic Games were held in Tokyo, Japan.The 2021, Olympic Games were held in, Tokyo Japan. 22. Which of the following actions is necessary to be considered in responsible charge of professional engineering work?(a) Be physically present when the work is being performed or through the use of communication devices be available in a reasonable period of time.(b) Review and approve proposed decisions prior to their implementation.(c) Retain independent control and direction of the investigation or design of engineering work.(d) All of the above. How much would you have after 4 years if you invested $1250 with a quarterly compounding interest rate of 5%? Please Answer Math 10 The Haber process for producing ammonia commercially is represented by the equation N2(g) + 3H2(g) 2NH3(g). To completely convert 9.0 mol H2 gas to NH3 gas, how many moles of nitrogen gas are required? Create a discussion post that includes your answers to the following questionsList your roles in life. What are your various roles in life? Write a list of your current roles, beginning with your role as a "student." A role is any function to which we regularly devote large chunks of time. Besides the student role, what are other roles you have?Write down dreams for each of your roles. What are your dreams, or things you really want related to each role? What, for example, is your absolute biggest dream as a student? A 2-year associates degree? A four-year bachelors? A masters? A doctorate? Do not worry at this time about how you will do it. What do you really want for each role? You can write your role-related dreams as bullet points, a list, or in a paragraph.In writing, think about your current relationship to your dreams. Whats on your mind right now about your dreams? How will college contribute to the achievement of your life dreams? What does the trigonometry angle range -[tex]\pi \leq \alpha \leq \pi[/tex] radians mean? Calculate the energy associated with photon of light having a wavelength 6000A. [h=6.62410erg sec]